Search Results - (( based intrusion protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- protocol algorithm »
- implication based »
- java implication »
- based intrusion »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
3
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Researchers have been developing a system using intrusion detector approach base on differential analysis. …”
Get full text
Get full text
Monograph -
4
Intrusion detection on the in-vehicle network using machine learning
Published 2021“…This paper presents an intrusion detection method based on the Isolation Forest (iForest) algorithm that detects message insertion attacks using message timing information. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms for building Intrusion Detection Systems (IDS) based on different WSN routing protocol classifications with respect to energy-efficient manner. …”
Get full text
Get full text
Conference or Workshop Item -
6
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
7
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
8
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…The vulnerability of in-vehicle networks, particularly those based on the Controller Area Network (CAN) protocol, has prompted the development of numerous techniques for intrusion detection on the CAN bus. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
A Patent Technique of Jaccard Discrete (J-DIS) Similarity Clustering Algorithm
Published 2014“…Few authors investigated clustering based on k-Means to distinguish intrusions based on the particular class. …”
Get full text
Get full text
Journal -
13
-
14
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
15
Windows-Based bandwidth allocation on optical networks
Published 2009“…We hope in the next article we will make a comparison table among static and dynamic bandwidth allocations algorithms and propose an algorithm on dynamic bandwidth allocation and evaluate our proposed algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
16
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…The difficulty and impracticality of decrypting TLS network traffic before it reaches the Intrusion Detection System (IDS) has driven numerous research studies to focus on anomaly-based malware detection without decryption employing various features and Machine Learning (ML) algorithms. …”
Get full text
Get full text
Thesis -
17
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The DPI provides more visibility into the contents of OT network traffic based on OT protocols. The Machine learning (ML) techniques are deployed for cyber-attack detection of datasets from the cyber kit. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Router-Based bandwidth allocation on optical networks
Published 2009“…Now, in this paper related to our totally categorize of bandwidth allocation methods to three groups as Static, Router-Based and Windows-Based, we will explain seven major weaknesses on Router-Based dynamic group and describe the improvements on them one by one. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Static bandwidth allocation on optical networks
Published 2009“…A detailed understanding of the many facets of the Internet's topological structure is critical for evaluating the performance of networking protocols, for assessing the effectiveness of proposed techniques to protect the network from nefarious intrusions and attacks, or for developing improved designs for resource provisioning. …”
Get full text
Get full text
Conference or Workshop Item
